Get Ready for Cyberwars
	
  
  
	
	  New California Media
	
  
  
	
	   
	
  
  
	
	  by Ron Chepesiuk, © Pacific News Service
	
  
  Thursday, 23rd August 2001 - Many may not know it but China and the 
	United States have been at war — not with soldiers or bombs, but rather with 
	geeks and computers. In May, American computer hackers mounted attacks on 
	Chinese Web sites and their Chinese counterparts began retaliating in earnest. 
	The "cyberwar," so far, has been pretty tame. That could change, however. 
  
   When the cyberwar finally ended in mid-May, analysts took stock of the damage 
	and estimated that the hackers had struck a few hundred Web sites with messages 
	paying tribute to the Chinese government. But the analysts also downplayed 
	the episode and the media’s use of the term "cyberwar" to describe what happened. 
  
   "It was a geek war, minor stuff, that didn’t directly involved the Chinese 
	and U.S. governments," said Adam Keiper, president of the Center for the Study 
	of Technology and Security in Washington, D.C. "The damage was minimal. After 
	all, no banks were broken into, no electric power grids crashed, and no air 
	service was disrupted."
   The Web site for the White House Historical Association, is a typical example 
	of the extent of damage hackers inflicted. When the Historical Association 
	received e-mails asking the strange question, Why do you have Chinese flags 
	on your web site?, the manager found on the home page, the PRC flag, which 
	didn’t exactly mesh with the pictures of Abraham Lincoln and George Washington 
	next to it.
   Keiper added that the U.S.-China hacker spate did do one positive thing: 
	" It drew attention to the potential dangers that cyber attacks pose to economic 
	and security systems and to the serious consequences that might result from 
	such actions."
   Future Conflicts
   What happened in cyberspace between China and the United States last spring 
	foreshadows how conflicts will be fought in the future. Cyberspace will be 
	the major battlefield of the 21st century, analysts have predicted, and a 
	country’s primary military objective will be to shut down the enemy’s computer 
	system, not blow up its military installations or shoot down its planes. Such 
	a scenario will have serious implications for businesses and economic systems. 
  
   "I see no evidence to indicate that the United States is doing enough to 
	protect its economic system," said Chris Rush, president of Chris Rush and 
	Associates, a White Plains, N.Y.-based consulting firm.
   Added Rush: "Cyber hacking has become a worldwide problem. I don’t think 
	there is a country in the world that hasn’t experienced it at one time or 
	another."
   Indeed, there have been several incidents in the last two years that give 
	a chilling picture of the type of cyber warfare that will fought in the future:
   — In April 1998, computer hackers threatened to sabotage Indonesia are banking 
	system if the country rejected the upcoming vote on East Timor independence. 
	East Timor resistance leader Jose Horta warned that hackers were designing 
	a dozen computer viruses to infect computers if the ballot on the territory’s 
	future was fraudulent.
   — Last February, computer hackers from the China launched hacker attacks 
	against major Japanese companies as retaliation against what they perceived 
	as Japan’s increasing hard-line against China. Slogans put on the defaced 
	Web pages included "Down with Japanese militarism" and "Kill all Japs."
   — From March 1999 to April 2000, there were 89 hacker attacks on 60 government 
	agencies in Malaysia, which included sensitive data carrying departments such 
	as the treasury, immigration, public works and social security. Also hit were 
	several non-government sites, including Hong Leong, Malaysian Airlines and 
	MidValley Mega Mall.
   — On May 15, a South Korean government security agency blamed the Sino-U.S. 
	cyber war for the 164 cyber attacks on South Korean Web sites that had occurred 
	since the previous May 4. Computer analysts told the Times of India that American 
	and Chinese hackers were using Korea to get into rival countries’ computer 
	systems without revealing their identity. South Korea has extensive computer 
	links with both China and the United States.
   The reported cyber attacks are just the tip of the iceberg, the experts 
	say. "Many governments and companies consider it bad practice to reveal that 
	they have become a victim of a successful computer attack," Keiper explained.
   On the Defense
   Many countries have moved to defend themselves against cyber conflict by 
	developing the capacity to launch counter attacks that can wreck havoc on 
	the enemy’s computer systems. In addition to the United States and China, 
	these countries include North Korea, Britain, Cuba, Iraq, Libya, Israel, France 
	and Taiwan.
   Since the late 1990s, China and Taiwan have been in a hacking war. In August 
	1999, for example, after Taiwan President Teng Hui-Lee propounded the "two 
	state theory" of China, Chinese and Taiwanese hackers bombarded each country’s 
	Web sites with crude messages. In 1999, the media reported that the PRC was 
	getting ready to spend billions of dollars on a high-tech upgrade of the People’s 
	Liberation Army to prepare the country for future cyber war with Taiwan and 
	its allies. In January 2000, Agente France Press reported that to defend itself, 
	Taiwan had developed approximately 1,000 computer viruses.
   "Taiwan has one of the world’s largest computer 
	software and hardware manufacturing bases," said D.K. Matai, 
	managing director of the British-based mi2g. "The 
	computer software programmers in Taiwan are world class. Our view is that 
	getting involved in any kind of conflict with Taiwan, given the kind of intellectual 
	capacity the country has, may prove detrimental." 
   The Chinese government has been quite open about its future strategic military 
	objective. In paper appearing in the spring issue of China Military Science 
	journal, a member of the Chinese Committee of Science, Technology and Industry 
	of the System Engineering Institute, wrote: "We are in the midst of a new 
	technology in which electronic information technology is the central technology. 
	The technology provides unprecedented applications for the development of 
	new weaponry … Military battles during the 21st century will unfold around 
	the use of information for military and political goals."
   Meanwhile in the United States, the U.S. Space Command has been building 
	offensive computer weapons to use against its enemies, it announced in fall 
	2000. Secretary of Defense Donald Rumsfeld has ranked cyber warfare a major 
	national security threat and made the protection of intelligence, communications, 
	logistics, navigation and military computer functions the United State’s top 
	priority. 
   What kind of viruses will the United States unleash against its enemies 
	if cyber war becomes a reality? They include so-called "Trojan horse" viruses 
	that can be put into an enemy’s computer systems; logic bombs that can be 
	triggered on command; "sniffer" programs that eavesdrop, monitor and then 
	steal data from networks; and programs called worms that can reproduce themselves 
	and cause networks to overload.
   Economic Implications
   In the past decade, information technology has become critical to the global 
	economy. That means Asian American businesses need to protect themselves against 
	the threat, security analysts advise. Businesses need to determine what resources 
	they want to protect, what valuable data is stored in their computer system, 
	and what security risks are associated with it. In a recent University of 
	Michigan study, 93.6 percent of the 200 businesses surveyed said computer 
	crime struck their operation at least once. 
   "Hackers view the United States as a special challenge," Rush said. "Just 
	because a business is small doesn’t mean that it isn’t vulnerable to cyber 
	attack. A business, whatever its size, should have cyber security measures 
	in place."
   But preparing for disaster is only the beginning. As the Internet evolves, 
	information systems will become more complicated and hacker skills more sophisticated, 
	the ability to protect ones interests can only become increasingly difficult. 
  
   Said Keiper: "The vulnerability to cyber attack will increase as we become 
	more and more dependent on the Internet in terms of information technology."